Dr Chris Culnane

  • Room: Level: 09 Room: 9.18
  • Building: Doug McDonell Building
  • Campus: Parkville

Research interests

  • Applied Cryptography
  • Cyber Security
  • Privacy
  • Verifiable Electronic Voting (Design and Implementation)

Personal webpage

https://people.eng.unimelb.edu.au/cculnane/

Biography

A key focus of my research is to develop theoretical security mechanisms into fully functional implementations of security systems. My recent research has been focussed on end-to-end verifiable voting schemes. Prior to starting at the University of Melbourne, I worked as a Research Fellow at the University of Surrey on the Trustworthy Voting Systems Project (TVS). The TVS Project resulted in the University of Surrey being contracted to design, develop and deploy an end-to-end verifiable election for Victorian Electoral Commission, as part of their vVote project. I was the technical lead, for the University of Surrey, on the vVote project, and led the design and implementation of the system. The system consisted of more than 25,000 lines of code and was successfully deployed as the Electronically Assisted Voting scheme in the Victorian state election, 2014. As part of the project we implemented a high scalable threshold web bulletin board, which involved the design and development of a new distributed consensus protocol that provides end-of-day byzantine fault tolerance.

My current works focusses on the verifiable postal voting. I am also interested in applying the techniques and analyses from verifiable voting in the wider field of privacy.

Recent publications

  1. Culnane C, Teague V. Strategies for Voter-Initiated Election Audits. 7th International Conference on Decision and Game Theory for Security (GameSec). Springer Verlag. 2016, Vol. 9996. Editors: Zhu Q, Alpcan T, Panaousis E, Tambe M, Casey W.
  2. Burton C, Culnane C, Schneider S. VVote: Verifiable Electronic Voting in Practice. IEEE Security and Privacy. 2016, Vol. 14, Issue 4.
  3. Culnane C, Ryan PYA, Schneider S, Teague V. vVote: A Verifiable Voting System. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY. Association for Computing Machinery (ACM). 2015, Vol. 18, Issue 1.
  4. Culnane C, Schneider S. A peered bulletin board for robust use in verifiable voting systems. Proceedings of the Computer Security Foundations Workshop. 2014, Vol. 2014-January.
  5. Srinivasan S, Culnane C, Heather J, Schneider S, Xia Z. Countering ballot stuffing and incorporating eligibility verifiability in Helios. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag. 2014, Vol. 8792.
  6. Schneide S, Teague V, Culnane C, Heather J. Special section on vote-ID 2013. Journal of Information Security and Applications. 2014, Vol. 19, Issue 2.
  7. Heather J, Culnane C, Schneider S, Srinivasan S, Xia Z. Solving the discrete logarithm problem for packing candidate preferences. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag. 2013, Vol. 8128 LNCS.
  8. Burton C, Culnane C, Heather J, Peacock T, Ryan PYA, Schneider S, Srinivasan S, Teague V, Wen R, Xia Z. A supervised verifiable voting protocol for the Victorian electoral commission. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI). 2012, Vol. P-205.
  9. Schneider S, Srinivasan S, Culnane C, Heather J, Xia Z. Prêt á Voter with write-ins. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag. 2012, Vol. 7187 LNCS.
  10. Schneider S, Llewellyn M, Culnane C, Heather J, Srinivasan S, Xia Z. Focus group views on Prêt à Voter 1.0. Proc. of 2011 Int. Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011 - In Conjunction with the 19th IEEE International Requirements Engineering Conference 2011, RE 2011. 2011.
  11. Briffa JA, Culnane C, Treharne H. Imperceptible printer dot watermarking for binary documents. Proceedings of SPIE - The International Society for Optical Engineering. 2010, Vol. 7723.
  12. Xia Z, Culnane C, Heather J, Jonker H, Ryan PYA, Schneider S, Srinivasan S. Versatile Prêt à voter: Handling multiple election methods with a unified interface. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag. 2010, Vol. 6498 LNCS.
  13. Culnane C, Treharne H, Ho ATS. Authenticating binary text documents using a localising OMAC wtermark robust to printing and sanning. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag. 2008, Vol. 5041 LNCS.
  14. Culnane C, Treharne H, Ho ATS. Improving mutli-set formatted binary text watermarking using continuous line embedding. Second International Conference on Innovative Computing, Information and Control, ICICIC 2007. 2008.
  15. Williams DM, Treharne H, Ho ATS, Culnane C. Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol. MM and Sec'08: Proceedings of the 10th ACM Workshop on Multimedia and Security. 2008.

View a full list of publications on the University of Melbourne’s ‘Find An Expert’ profile